Vulnerability Details : CVE-2024-1597
pgjdbc, the PostgreSQL JDBC Driver, allows attacker to inject SQL if using PreferQueryMode=SIMPLE. Note this is not the default. In the default mode there is no vulnerability. A placeholder for a numeric value must be immediately preceded by a minus. There must be a second placeholder for a string value after the first placeholder; both must be on the same line. By constructing a matching string payload, the attacker can inject SQL to alter the query,bypassing the protections that parameterized queries bring against SQL Injection attacks. Versions before 42.7.2, 42.6.1, 42.5.5, 42.4.4, 42.3.9, and 42.2.28 are affected.
Vulnerability category: Sql Injection
Products affected by CVE-2024-1597
- cpe:2.3:a:postgresql:postgresql_jdbc_driver:*:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql_jdbc_driver:*:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql_jdbc_driver:*:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql_jdbc_driver:*:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql_jdbc_driver:*:*:*:*:*:*:*:*
- cpe:2.3:a:postgresql:postgresql_jdbc_driver:*:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2024-1597
0.11%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 30 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2024-1597
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
10.0
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
3.9
|
6.0
|
PostgreSQL | 2024-02-19 |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST | 2024-03-25 |
CWE ids for CVE-2024-1597
-
The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.Assigned by:
- f86ef6dc-4d3a-42ad-8f28-e6d5547a5007 (Secondary)
- nvd@nist.gov (Primary)
References for CVE-2024-1597
-
https://github.com/pgjdbc/pgjdbc/security/advisories/GHSA-24rp-q3w6-vc56
Page not found · GitHub · GitHubThird Party Advisory
-
https://security.netapp.com/advisory/ntap-20240419-0008/
CVE-2024-1597 PostgreSQL Vulnerability in NetApp Products | NetApp Product Security
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TZQTSMESZD2RJ5XBPSXH3TIQVUW5DIUU/
[SECURITY] Fedora 40 Update: postgresql-jdbc-42.7.3-1.fc40 - package-announce - Fedora Mailing-ListsMailing List;Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2024/04/02/6
oss-security - CVE-2024-1597: PostgreSQL pgjdbc: SQL injection in non-default configuration
-
https://www.enterprisedb.com/docs/security/assessments/cve-2024-1597/
EDB Docs - CVE-2024-1597 - SQL Injection via line comment generationThird Party Advisory
-
https://www.enterprisedb.com/docs/jdbc_connector/latest/01_jdbc_rel_notes/
EDB Docs - JDBC Connector v42.5.4.2 - Release notesRelease Notes
-
https://lists.debian.org/debian-lts-announce/2024/05/msg00007.html
[SECURITY] [DLA 3812-1] libpgjava security update
Jump to